educause security professionals conference network access control through quarantine, remediation,...

18
Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager Office of the VP for IT Indiana University 5 May 2008 Copyright 2008, The Trustees of Indiana University. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Upload: alicia-harvey

Post on 18-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Educause Security Professionals Conference

Network Access Control through Quarantine, Remediation, and

Verification

Jonny SweenyIncident Response Manager

Office of the VP for ITIndiana University

5 May 2008

Copyright 2008, The Trustees of Indiana University. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Page 2: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Overview

• IU’s Get Connected– Computers new to the network

• Blocking `bad` systems– Communication

– Restoring access

Page 3: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager
Page 4: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Get Connected Stats• 7,641 computers connected in 14 days

• Currently only required in Residence Halls on Windows wired connections

• 81% are laptops

Page 5: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Other reasons to restrict network access

• Compromised systems– detected by sensors

• Port scanning, high mailers, etc.

– Detected by logs• DNS botted, spyware, etc.• Webmail compromised credentials

• Copyright Infringement

Page 6: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Blocking Options

• MAC Address• VPN• Dialup• 802.1x• Static IP null-route• Switch-port

Page 7: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Communication

• User needs to know why machine is blocked– Sending an email to the user is not

sufficient, however CC-ing their support provider helps

– Redirecting to a self-service site is ideal.

– Dynamically-assigned VLANs.

Page 8: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

User receivesnotification email

Jonny,

Network reports indicate that the computer listed below has beencompromised. It appears a bot has taken over the system. A "bot,"or "robot," is a program that is installed by an intruder, so thatthe machine takes actions automatically, as programmed by theintruder and at times specified by the intruder who put the bot there.

Date (Timezone=UTC) Type IP Address Remote IP Address------------------- ---- --------------- ---------------2008-03-12 02:57:12 vpn 156.56.175.226 76.252.188.1 2008-04-01 14:01:31 dhcp 156.56.18.118 00:06:5b:17:17:xx iu-itpo-iceland

*** Network access for this user or computer is being blocked to ****** protect the University network from this threat. ***

If your machine is not running a Windows operating system, pleaseconsult with the Support Center on how to rebuild for your operatingsystem.

To recover from this compromise it is necessary to completely rebuildthe computer. When a computer is compromised in this manner, anythingon the system can be modified and/or monitored by someone else.

When you are finished and wish to have network access restored,please reply back to this message, leaving the subject line intact,and outline specifically what actions you took. You must take allactions listed in order for us to restore access.

Help with these steps can be obtained from the KB article titled "InWindows, how do I rebuild my computer after a system-levelcompromise" available at [http://kb.iu.edu/data/anbp.html ].

1. Remove the computer from the network by removing the network cable from the computer, or by turning off the wireless or dialup connection. Do not reconnect the computer until all steps have been completed, or you run the risk of being compromised again.

2. Backup your personal files. If you do not take this step, you will lose all of your data when you perform step #3.

3. Perform a New Install of Windows XP or Vista. Make sure you use a new password for the Administrator account when setting up Windows. When you reboot the machine, you should allow automatic updates when prompted, which is the recommended action.

4. Install anti-virus software. Symantec AntiVirus is available on the IUware CD, and is configured to update virus patterns daily. If you do not use Symantec AntiVirus, make sure your software is configured to update daily.

If you have any questions about these instructions, need helpobtaining the IUware CD, or Windows XP/Vista, or wouldlike assistance with the process, please consult with your LocalSupport Provider (LSP). If you do not have an LSP, please call theUITS Support Center at 855-6789 (IUB) or 274-4357 (IUPUI). Email:[email protected]

DO NOT CALL OR EMAIL US TO OBTAIN SUPPORT WE ARE NOT A SUPPORTUNIT. Please contact the Support Center for assistance. Only email uswhen you have completed these steps and are ready to get back on thenetwork.

Thank you for your immediate attention to this important matter.Please remember in your reply to outline *each* step you took. Simplyreplying with "I have completed all steps" is not enough.

Regards,

-- Jonny SweenyIT Incident Response ManagerIT Policy OfficeOffice of the VP for ITIndiana University

Incident Number: 85594

Page 9: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Self-service unblock

Page 10: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Self-service is great…but

• Need to prevent abuse of trust– Track instances of repeat-offenders

and treat them differently– Require tutorial & quiz– Delete registration so Get Connected

is required again

Page 11: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

DMCA Quiz

Page 12: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Random comments about automation

• Good relationships with network staff translates to access to tools.– Null-route– MacMon– Arpfind– Router Configs– Syslogs– Dialup, VPN blocks– etc.

Page 13: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Random comments about automation

• Access to tools allows automation:– Block scanners, phishers, brute-

forcers, etc.• Blocking remainder of leases

Page 14: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Automate Response – IR Web Service

Page 15: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Identify user

Page 16: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

User is blocked and notified

Page 17: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Final Thoughts• 802.1x rolling out now

– 2,700 WAPs by fall• Dean of Students NAC

– Third copyright violation results in permanent ban from attaching personal device to University network

Page 18: Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager

Questions

Jonny [email protected]